309 resultados para active surveillance
Resumo:
Complex surveillance problems are common in biosecurity, such as prioritizing detection among multiple invasive species, specifying risk over a heterogeneous landscape, combining multiple sources of surveillance data, designing for specified power to detect, resource management, and collateral effects on the environment. Moreover, when designing for multiple target species, inherent biological differences among species result in different ecological models underpinning the individual surveillance systems for each. Species are likely to have different habitat requirements, different introduction mechanisms and locations, require different methods of detection, have different levels of detectability, and vary in rates of movement and spread. Often there is a further challenge of a lack of knowledge, literature, or data, for any number of the above problems. Even so, governments and industry need to proceed with surveillance programs which aim to detect incursions in order to meet environmental, social and political requirements. We present an approach taken to meet these challenges in one comprehensive and statistically powerful surveillance design for non-indigenous terrestrial vertebrates on Barrow Island, a high conservation nature reserve off the Western Australian coast. Here, the possibility of incursions is increased due to construction and expanding industry on the island. The design, which includes mammals, amphibians and reptiles, provides a complete surveillance program for most potential terrestrial vertebrate invaders. Individual surveillance systems were developed for various potential invaders, and then integrated into an overall surveillance system which meets the above challenges using a statistical model and expert elicitation. We discuss the ecological basis for the design, the flexibility of the surveillance scheme, how it meets the above challenges, design limitations, and how it can be updated as data are collected as a basis for adaptive management.
Resumo:
Video surveillance technology, based on Closed Circuit Television (CCTV) cameras, is one of the fastest growing markets in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. To overcome this limitation, it is necessary to have “intelligent” processes which are able to highlight the salient data and filter out normal conditions that do not pose a threat to security. In order to create such intelligent systems, an understanding of human behaviour, specifically, suspicious behaviour is required. One of the challenges in achieving this is that human behaviour can only be understood correctly in the context in which it appears. Although context has been exploited in the general computer vision domain, it has not been widely used in the automatic suspicious behaviour detection domain. So, it is essential that context has to be formulated, stored and used by the system in order to understand human behaviour. Finally, since surveillance systems could be modeled as largescale data stream systems, it is difficult to have a complete knowledge base. In this case, the systems need to not only continuously update their knowledge but also be able to retrieve the extracted information which is related to the given context. To address these issues, a context-based approach for detecting suspicious behaviour is proposed. In this approach, contextual information is exploited in order to make a better detection. The proposed approach utilises a data stream clustering algorithm in order to discover the behaviour classes and their frequency of occurrences from the incoming behaviour instances. Contextual information is then used in addition to the above information to detect suspicious behaviour. The proposed approach is able to detect observed, unobserved and contextual suspicious behaviour. Two case studies using video feeds taken from CAVIAR dataset and Z-block building, Queensland University of Technology are presented in order to test the proposed approach. From these experiments, it is shown that by using information about context, the proposed system is able to make a more accurate detection, especially those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information give critical feedback to the system designers to refine the system. Finally, the proposed modified Clustream algorithm enables the system to both continuously update the system’s knowledge and to effectively retrieve the information learned in a given context. The outcomes from this research are: (a) A context-based framework for automatic detecting suspicious behaviour which can be used by an intelligent video surveillance in making decisions; (b) A modified Clustream data stream clustering algorithm which continuously updates the system knowledge and is able to retrieve contextually related information effectively; and (c) An update-describe approach which extends the capability of the existing human local motion features called interest points based features to the data stream environment.
Resumo:
Traffic safety in rural highways can be considered as a constant source of concern in many countries. Nowadays, transportation professionals widely use Intelligent Transportation Systems (ITS) to address safety issues. However, compared to metropolitan applications, the rural highway (non-urban) ITS applications are still not well defined. This paper provides a comprehensive review on the existing ITS safety solutions for rural highways. This research is mainly focused on the infrastructure-based control and surveillance ITS technology, such as Crash Prevention and Safety, Road Weather Management and other applications, that is directly related to the reduction of frequency and severity of accidents. The main outcome of this research is the development of a ‘ITS control and surveillance device locating model’ to achieve the maximum safety benefit for rural highways. Using cost and benefits databases of ITS, an integer linear programming method is utilized as an optimization technique to choose the most suitable set of ITS devices. Finally, computational analysis is performed on an existing highway in Iran, to validate the effectiveness of the proposed locating model.
Resumo:
Background Along with reduced levels of physical activity, older Australian's mean energy consumption has increased. Now over 60% of older Australians are considered overweight or obese. This study aims to confirm if a low-cost, accessible physical activity and nutrition program can improve levels of physical activity and diet of insufficiently active 60-70 year-olds. Methods/Design This 12-month home-based randomised controlled trial (RCT) will consist of a nutrition and physical activity intervention for insufficiently active people aged 60 to 70 years from low to medium socio-economic areas. Six-hundred participants will be recruited from the Australian Federal Electoral Role and randomly assigned to the intervention (n = 300) and control (n = 300) groups. The study is based on the Social Cognitive Theory and Precede-Proceed Model, incorporating voluntary cooperation and self-efficacy. The intervention includes a specially designed booklet that provides participants with information and encourages dietary and physical activity goal setting. The booklet will be supported by an exercise chart, calendar, bi-monthly newsletters, resistance bands and pedometers, along with phone and email contact. Data will be collected over three time points: pre-intervention, immediately post-intervention and 6-months post-study. Discussion This trial will provide valuable information for community-based strategies to improve older adults' physical activity and dietary intake. The project will provide guidelines for appropriate sample recruitment, and the development, implementation and evaluation of a minimal intervention program, as well as information on minimising barriers to participation in similar programs.
Resumo:
Early detection surveillance programs aim to find invasions of exotic plant pests and diseases before they are too widespread to eradicate. However, the value of these programs can be difficult to justify when no positive detections are made. To demonstrate the value of pest absence information provided by these programs, we use a hierarchical Bayesian framework to model estimates of incursion extent with and without surveillance. A model for the latent invasion process provides the baseline against which surveillance data are assessed. Ecological knowledge and pest management criteria are introduced into the model using informative priors for invasion parameters. Observation models assimilate information from spatio-temporal presence/absence data to accommodate imperfect detection and generate posterior estimates of pest extent. When applied to an early detection program operating in Queensland, Australia, the framework demonstrates that this typical surveillance regime provides a modest reduction in the estimate that a surveyed district is infested. More importantly, the model suggests that early detection surveillance programs can provide a dramatic reduction in the putative area of incursion and therefore offer a substantial benefit to incursion management. By mapping spatial estimates of the point probability of infestation, the model identifies where future surveillance resources can be most effectively deployed.
Resumo:
Gaining invariance to camera and illumination variations has been a well investigated topic in Active Appearance Model (AAM) fitting literature. The major problem lies in the inability of the appearance parameters of the AAM to generalize to unseen conditions. An attractive approach for gaining invariance is to fit an AAM to a multiple filter response (e.g. Gabor) representation of the input image. Naively applying this concept with a traditional AAM is computationally prohibitive, especially as the number of filter responses increase. In this paper, we present a computationally efficient AAM fitting algorithm based on the Lucas-Kanade (LK) algorithm posed in the Fourier domain that affords invariance to both expression and illumination. We refer to this as a Fourier AAM (FAAM), and show that this method gives substantial improvement in person specific AAM fitting performance over traditional AAM fitting methods.
Resumo:
This paper presents a series of ongoing experiments to facilitate serendipity in the design studio through a diversity of delivery modes. These experiments are conducted in a second year architectural design studio, and include physical, dramatic and musical performance. The act of designing is always exploratory, always seeking an unknown resolution, and the ability to see and capture the value in the unexpected is a critical aspect of such creative design practice. Engaging with the unexpected is however a difficult ability to develop in students. Just how can a student be schooled in such abilities when the challenge and the context are unforeseeable? How can students be offered meaningful feedback about an issue that cannot be predicted, when feedback comes in the form of extrinsic assessment from a tutor? This project establishes a number of student activities that seek to provide intrinsic feedback from the activity itself. Further to this, the project seeks to heighten student engagement with the project through physical expression and performance: utilising more of the students’ senses than just vision and hearing. Diana Laurillard’s theories of conversational frameworks (2002) are used to interrogate the act of dramatic performance as an act of learning, with particular reference to the serendipitous activities of design. Such interrogation highlights the feedback mechanisms that facilitate intrinsic feedback and fast, if not instantaneous, cycles of learning. The physical act of performance itself provides a learning experience that is not replicable in other modes of delivery. Student feedback data and independent assessment of project outcomes are used to assess the success of this studio model.
Resumo:
This paper presents background of our research and result of our pilot study to find methods for convincing building users to become active building participants. We speculate this is possible by allowing and motivating users to customise and manage their own built environments. The ultimate aim of this research is to develop open, flexible and adaptive systems that bring awareness to building users to the extent they recognise spaces are for them to change rather than accept spaces are fixed and they are the ones to adapt. We argue this is possible if the architectural hardware is designed to adapt to begin with and more importantly if there are appropriate user interfaces that are designed to work with the hardware. A series of simple prototypes were made to study possibilities through making, installing and experiencing them. Ideas discussed during making and experiencing of prototypes were evaluated to generate further ideas. This method was very useful to speculate unexplored and unknown issues with respect to developing user interfaces for active buildings.
Resumo:
The use of adaptive wing/aerofoil designs is being considered, as they are promising techniques in aeronautic/ aerospace since they can reduce aircraft emissions and improve aerodynamic performance of manned or unmanned aircraft. This paper investigates the robust design and optimization for one type of adaptive techniques: active flow control bump at transonic flow conditions on a natural laminar flow aerofoil. The concept of using shock control bump is to control supersonic flow on the suction/pressure side of natural laminar flow aerofoil that leads to delaying shock occurrence (weakening its strength) or boundary layer separation. Such an active flow control technique reduces total drag at transonic speeds due to reduction of wave drag. The location of boundary-layer transition can influence the position and structure of the supersonic shock on the suction/pressure side of aerofoil. The boundarylayer transition position is considered as an uncertainty design parameter in aerodynamic design due to the many factors, such as surface contamination or surface erosion. This paper studies the shock-control-bump shape design optimization using robust evolutionary algorithms with uncertainty in boundary-layer transition locations. The optimization method is based on a canonical evolution strategy and incorporates the concepts of hierarchical topology, parallel computing, and asynchronous evaluation. The use of adaptive wing/aerofoil designs is being considered, as they are promising techniques in aeronautic/ aerospace since they can reduce aircraft emissions and improve aerodynamic performance of manned or unmanned aircraft. This paper investigates the robust design and optimization for one type of adaptive techniques: active flow control bump at transonic flow conditions on a natural laminar flow aerofoil. The concept of using shock control bump is to control supersonic flow on the suction/pressure side of natural laminar flow aerofoil that leads to delaying shock occurrence (weakening its strength) or boundary-layer separation. Such an active flow control technique reduces total drag at transonic speeds due to reduction of wave drag. The location of boundary-layer transition can influence the position and structure of the supersonic shock on the suction/pressure side of aerofoil. The boundarylayer transition position is considered as an uncertainty design parameter in aerodynamic design due to the many factors, such as surface contamination or surface erosion. This paper studies the shock-control-bump shape design optimization using robust evolutionary algorithms with uncertainty in boundary-layer transition locations. The optimization method is based on a canonical evolution strategy and incorporates the concepts of hierarchical topology, parallel computing, and asynchronous evaluation. Two test cases are conducted: the first test assumes the boundary-layer transition position is at 45% of chord from the leading edge, and the second test considers robust design optimization for the shock control bump at the variability of boundary-layer transition positions. The numerical result shows that the optimization method coupled to uncertainty design techniques produces Pareto optimal shock-control-bump shapes, which have low sensitivity and high aerodynamic performance while having significant total drag reduction.
Resumo:
The importance of mitogen-activated protein kinase signaling in melanoma is underscored by the prevalence of activating mutations in N-Ras and B-Raf, yet clinical development of inhibitors of this pathway has been largely ineffective, suggesting that alternative oncogenes may also promote melanoma. Notch is an interesting candidate that has only been correlated with melanoma development and progression; a thorough assessment of tumor-initiating effects of activated Notch on human melanocytes would clarify the mounting correlative evidence and perhaps identify a novel target for an otherwise untreatable disease. Analysis of a substantial panel of cell lines and patient lesions showed that Notch activity is significantly higher in melanomas than their nontransformed counterparts. The use of a constitutively active, truncated Notch transgene construct (N(IC)) was exploited to determine if Notch activation is a "driving" event in melanocytic transformation or instead a "passenger" event associated with melanoma progression. N(IC)-infected melanocytes displayed increased proliferative capacity and biological features more reminiscent of melanoma, such as dysregulated cell adhesion and migration. Gene expression analyses supported these observations and aided in the identification of MCAM, an adhesion molecule associated with acquisition of the malignant phenotype, as a direct target of Notch transactivation. N(IC)-positive melanocytes grew at clonal density, proliferated in limiting media conditions, and also exhibited anchorage-independent growth, suggesting that Notch alone is a transforming oncogene in human melanocytes, a phenomenon not previously described for any melanoma oncogene. This new information yields valuable insight into the basic epidemiology of melanoma and launches a realm of possibilities for drug intervention in this deadly disease.